{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:09:03Z","timestamp":1773414543876,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T00:00:00Z","timestamp":1657324800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T00:00:00Z","timestamp":1657324800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Coin selection method refers to the process undergone when selecting a set of unspent transaction outputs (UTXOs) from a cryptocurrency wallet or account to use as inputs in each transaction. The most applied coin selection method that UTXO-based cryptocurrencies currently employ is an algorithm that decides on a certain set of UTXOs that matches the target amount and limits the transaction fee. However this approach trades off favourable maintenance overhead of the entire network for low transaction fees, as many low-value UTXOs known as \u201cdust\u201d is produced. Over time, this will impact the scalability and management of the cryptocurrency network as the global set of UTXOs become larger. Therefore, there is an urgency to find a higher-performing coin selection method suitable for UTXO-based cryptocurrencies. This paper proposes a method based on the greedy and genetic algorithm for effectively choosing sets of UTXOs in Bitcoin. The main objective of this coin selection strategy is to get as close as possible to the target while also maintaining and possibly reducing the number of UTXO inputs.<\/jats:p>","DOI":"10.1007\/s40747-022-00799-2","type":"journal-article","created":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T08:03:07Z","timestamp":1657353787000},"page":"421-434","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A coin selection strategy based on the greedy and genetic algorithm"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9455-6143","authenticated-orcid":false,"given":"Xuelin","family":"Wei","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2349-2549","authenticated-orcid":false,"given":"Chang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Haoran","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Siyan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yihong","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,9]]},"reference":[{"key":"799_CR1","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decent Bus Rev 21260"},{"key":"799_CR2","unstructured":"Blockchain data [EB\/OL]. https:\/\/www.blockchain.com\/zh-cn\/charts"},{"key":"799_CR3","doi-asserted-by":"crossref","unstructured":"Zima M (2018) (Short paper) inputs reduction for more space in bitcoin blocks. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, pp 112\u2013115","DOI":"10.1109\/CVCBT.2018.00020"},{"key":"799_CR4","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.180817","volume":"6","author":"C P\u00e9rez-Sol\u00e0","year":"2019","unstructured":"P\u00e9rez-Sol\u00e0 C, Delgado-Segura S, Navarro-Arribas G, Herrera-Joancomart\u00ed J (2019) Another coin bites the dust: an analysis of dust in UTXO-based cryptocurrencies. R Soc Open Sci 6:180817","journal-title":"R Soc Open Sci"},{"key":"799_CR5","unstructured":"Antonopoulos AM (2015) Mastering bitcoin: unlocking digital cryptocurrencies. O\u2019Reilly Media Inc"},{"key":"799_CR6","doi-asserted-by":"crossref","unstructured":"Saad M, Njilla L, Kamhoua C, Mohaisen A (2019) Countering selfish mining in blockchains. In: 2019 international conference on computing, networking and communications (ICNC). IEEE, pp 360\u2013364","DOI":"10.1109\/ICCNC.2019.8685577"},{"key":"799_CR7","doi-asserted-by":"crossref","unstructured":"Bamert T, Decker C, Elsen L, Wattenhofer R, Welten S (2013) Have a snack, pay with bitcoins. In: IEEE P2P, Proceedings. IEEE, pp 1\u20135","DOI":"10.1109\/P2P.2013.6688717"},{"key":"799_CR8","unstructured":"Wuille P, Lombrozo E, Lau J. Segregated witness (consensus layer) [EB\/OL]. https:\/\/github.com\/bitcoin\/bips\/wiki\/Comments:BIP-0141"},{"key":"799_CR9","doi-asserted-by":"crossref","unstructured":"\u00d6zy\u0131lmaz KR, Patel H, Malik A (2018) Split-scale: scaling bitcoin by partitioning the utxo space. In: 2018 IEEE 9th international conference on software engineering and service science (ICSESS). IEEE, pp 41\u201345","DOI":"10.1109\/ICSESS.2018.8663851"},{"key":"799_CR10","unstructured":"Johannsson DV, Garzik J, Harding T. Dynamic maximum block size by miner vote [EB\/OL]. https:\/\/github.com\/bitcoin\/bips\/wiki\/Comments:BIP-0100"},{"key":"799_CR11","unstructured":"Chang X, Zhao Y, School S, University F (2019) Scaling bitcoin: the state of development and future trend. Comput Appl Softw"},{"key":"799_CR12","unstructured":"Poon J, Dryja T (2016) The bitcoin lightning network: scalable off-chain instant payments"},{"issue":"10","key":"799_CR13","first-page":"2390","volume":"54","author":"Y Hui","year":"2017","unstructured":"Hui Y, Zongyang Z, Jianwei L (2017) Research on scaling technology of bitcoin blockchain. J Comput Res Dev 54(10):2390","journal-title":"J Comput Res Dev"},{"key":"799_CR14","unstructured":"Kasahara S, Kawahara J (2016) Effect of bitcoin fee on transaction-confirmation process. arXiv:1604.00103"},{"key":"799_CR15","doi-asserted-by":"crossref","unstructured":"Li J, Yuan Y, Wang S, Wang F-Y (2018) Transaction queuing game in bitcoin blockchain. In: IEEE intelligent vehicles symposium (IV). IEEE, pp 114\u2013119","DOI":"10.1109\/IVS.2018.8500403"},{"key":"799_CR16","unstructured":"Transaction data [EB\/OL]. https:\/\/www.cnblogs.com\/zhaoweiwei\/p\/transaction.html"},{"key":"799_CR17","unstructured":"Bitcoin Core. Bitcoin core 22.0 release notes [EB\/OL]. https:\/\/github.com\/bitcoin\/bitcoin\/blob\/master\/doc\/release-notes\/release-notes-22.0.md"},{"key":"799_CR18","unstructured":"Erhardt M (2020) An evaluation of coin selection strategies. Master thesis"},{"key":"799_CR19","unstructured":"Diroff DJ (2019) Bitcoin coin selection with leverage [Online]. arXiv:1911.01330 [cs.DS]"},{"key":"799_CR20","unstructured":"Abramova S, B\u00f6hme R (2020) Your money or your privacy: a systematic approach to coin selection. Cryptoeconomic Systems, vol 20 [Online]. https:\/\/assets.pubpub.org\/dwq1f9g6\/71581340076503.pdf"},{"issue":"1","key":"799_CR21","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s11721-007-0002-0","volume":"1","author":"R Poli","year":"2007","unstructured":"Poli R, Kennedy J, Blackwell T (2007) Particle swarm optimization. Swarm Intell 1(1):33\u201357","journal-title":"Swarm Intell"},{"key":"799_CR22","doi-asserted-by":"crossref","unstructured":"Li K, Zhang T, Wang R (2020) Deep reinforcement learning for multiobjective optimization. IEEE Trans Cybern 51(6):3103\u20133114","DOI":"10.1109\/TCYB.2020.2977661"},{"key":"799_CR23","unstructured":"Tian Z, Jia-Xiang LI (2013) Approach for course of actions determination in influence nets based on greedy algorithm. Command Control & Simulation"},{"key":"799_CR24","first-page":"22","volume":"2013","author":"M Yan-qin","year":"2013","unstructured":"Yan-qin M (2013) Greedy algorithm-based improved adaptive genetic algorithm and its application. Value Eng 2013:22","journal-title":"Value Eng"},{"key":"799_CR25","doi-asserted-by":"crossref","unstructured":"Guo P, Wang X, Han Y (2010) The enhanced genetic algorithms for the optimization design. In: 2010 3rd international conference on biomedical engineering and informatics, vol\u00a07. IEEE, pp 2990\u20132994","DOI":"10.1109\/BMEI.2010.5639829"},{"key":"799_CR26","doi-asserted-by":"crossref","unstructured":"Deng X (2008) Application of adaptive genetic algorithm in inversion analysis of permeability coefficients. In: 2008 second international conference on genetic and evolutionary computing. IEEE, pp 61\u201365","DOI":"10.1109\/WGEC.2008.63"},{"key":"799_CR27","doi-asserted-by":"crossref","unstructured":"Nguyen V-H, Trang H-S, Nguyen Q-T, Huynh-Tuong N, Le T-V (2018) Building mathematical models applied to utxos selection for objective transactions. In: 2018 5th NAFOSTED conference on information and computer science (NICS). IEEE, pp 160\u2013164","DOI":"10.1109\/NICS.2018.8606819"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00799-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00799-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00799-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T18:52:32Z","timestamp":1677091952000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00799-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,9]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["799"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00799-2","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,9]]},"assertion":[{"value":"19 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}